Difference between pages "Bibliography" and "Cell phones"

From ForensicsWiki
(Difference between pages)
Jump to: navigation, search
(Disk Disposal and Data Recovery)
 
(Technologies)
 
Line 1: Line 1:
=Disk Disposal and Data Recovery=
+
'''Cell phones''' or '''mobile phones''' are an important target for [[forensic investigator]]s.
* [http://www.deepspar.com/pdf/DeepSparDiskImagingWhitepaper3.pdf Disk Imaging: A Vital Step in Data Recovery], DeepSpar Data Recovery Systems, November 2006
+
* [http://www.actionfront.com/ts_whitepaper.asp Drive-Independent Data Recovery: The Current State-of-the-Art], ActionFront Data Recovery Labs, August 2005.
+
* [[Recovering Overwritten Data#The Gutmann Paper|Secure Deletion of Data from Magnetic and Solid-State Memory]], Peter Gutmann, Proceedings of the Sixth Usenix Security Symposium, 1996. [http://www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.html]
+
* [http://www-03.ibm.com/financing/pdf/us/recovery/igf4-a032.pdf Hard Drive Disposal: The Overlooked Confidentiality Exposure], FInancial Perspectives, IBM White Paper, November 2003.
+
  
=Evidence Gathering=
+
== Technologies ==
 +
 +
* [[CDMA]]
 +
* [[TDMA]]
 +
* [[GSM]]
 +
* [[iDEN]]
 +
* [[EDGE]]
 +
* [[GPRS]]
 +
* [[UMTS]]
  
* [http://utdallas.edu/~sxs018540/index/docs/byteprints_itcc05.pdf Byteprints: A Tool to Gather Digital Evidence], Sriranjani Sitaraman, Srinivasan Krishnamurthy and S. Venkatesan, Proceedings of the International Conference on Information Technology (ITCC 2005), Las Vegas, Nevada, USA, April 4 - 6, 2005
+
== Hardware ==
  
=Fake Information=
+
* [[RIM BlackBerry]]
 +
* [[T-Mobile Sidekick  ]]
 +
* [[SIM Cards]]
  
* [https://analysis.mitre.org/proceedings/Final_Papers_Files/84_Camera_Ready_Paper.pdf Automatic Detection of Fake File Systems], Neil C. Rowe, International Conference on Intelligence Analysis Methods and Tools, McLean, Virginia, May 2005.
+
== Operating Systems ==
  
=Other Papers=
+
* [[Microsoft PocketPC]]
 +
* [[Microsoft Windows Mobile]]
 +
* [[Palm]]
 +
* [[RIM BlackBerry]]
 +
* [[Symbian]]
 +
* [[Linux]]
  
* [http://citeseer.ist.psu.edu/shanmugasundaram03automatic.html  Automatic Reassembly of Document Fragments via Context Based Statistical Models], Kulesh Shanmugasundaram and Nasir Memon.
+
== Forensics ==
  
* [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=531782 A Model for When Disclosure Helps Security: What is Different About Computer and Network Security?], Peter P. Swire, Moritz College of Law of the Ohio State University, Journal on Telecommunications and High Technology Law, Vol. 2, 2004.
+
'''Procedures'''
 +
 
 +
* [[Cell Phone Forensics]]
 +
* [[SIM Card Forensics]]
 +
* [[External Memory Card Forensics]]
 +
 
 +
== Tools ==
 +
 
 +
'''Hardware'''
 +
* [[ Azimuth RadioProof™ Enclosures]]
 +
* [[Radio Frequency (RF) Jammers]]
 +
* [[Network Security Solutions Secure Tents]]
 +
* [[Network Security Solutions Seizure Bags for Cell Phones/PDAs/Laptops]]
 +
* [[Paraben StrongHold Bag]]
 +
* [[Paraben StrongHold Tent]]
 +
 
 +
'''Software'''
 +
* [[BitPIM]]
 +
* [[DataPilot Secure View]]
 +
* [[FloAt's Mobile Agent]]
 +
* [[ForensicMobile]]
 +
* [[ForensicSIM]]
 +
* [[LogiCube CellDEK]]
 +
* [[MicroSystemation .XRY]]
 +
* [[MOBILedit!]]
 +
* [[Oxygen PM II]]
 +
* [[Paraben Device Seizure]]
 +
* [[Paraben SIM Seizure]]
 +
* [[Phone-Forensics.com CLiVE]]
 +
* [[Quantaq USIMdetective]]
 +
* [[Quantaq USIMcommander]]
 +
* [[Quantaq USIMdetective]]
 +
* [[Quantaq USIMexplorer]]
 +
* [[Quantaq USIMprofiler]]
 +
* [[Quantaq USIMregistrar]]
 +
* [[SIMCon]]
 +
* [[TULP2G]]

Revision as of 20:54, 15 October 2006

Cell phones or mobile phones are an important target for forensic investigators.

Technologies

Hardware

Operating Systems

Forensics

Procedures

Tools

Hardware

Software